Improvement on Meshram et al.'s ID-based cryptographic mechanism

被引:1
作者
Pang, Liaojun [1 ,2 ]
Li, Huixian [2 ,3 ]
Pei, Qingqi [4 ]
Wang, Yumin [4 ]
机构
[1] Xidian Univ, Sch Life Sci & Technol, Xian 710071, Peoples R China
[2] Wayne State Univ, Dept Comp Sci, Detroit, MI 48202 USA
[3] Northwestern Polytech Univ, Sch Comp Sci & Engn, Xian 710072, Peoples R China
[4] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
Cryptography; ID-based cryptosystem; Deadlock; GDLP; IFP;
D O I
10.1016/j.ipl.2013.07.019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Meshram et al. proposed an ID-based cryptosystem based on the generalized discrete logarithm problem (GDLP) and the integer factorization problem (IFP) in 2012, and their contribution lies in that they firstly proposed an idea to construct the ID-based cryptosystem without using the bilinear pair. This scheme can achieve the security goal of protecting data and prevent the adversary from snooping the encrypted data or the user's private key. However, our analyses show that their scheme is still incorrect and has a deadlock problem, because the user cannot carry out the encryption process as expected because it is required for the user to own the key authentication center's private information which is designed to be secret to users. A solution to the deadlock problem is given and an improved scheme is proposed. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:789 / 792
页数:4
相关论文
共 6 条
  • [1] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [2] An ID-based cryptographic mechanisms based on GDLP and IFP
    Meshram, Chandrashekhar
    Meshram, Suchitra A.
    Zhang, Mingwu
    [J]. INFORMATION PROCESSING LETTERS, 2012, 112 (19) : 753 - 758
  • [3] Improved multicast key management of Chinese wireless local area network security standard
    Pang, L.
    Li, H.
    Pei, Q.
    [J]. IET COMMUNICATIONS, 2012, 6 (09) : 1126 - 1130
  • [4] Pang LJ, 2013, COMPUT INFORM, V32, P441
  • [5] RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
  • [6] Shamir A., 1985, WORKSHOP THEORY APPL, V196, P47, DOI [10.1007/3-540-39568-7_5, 10.1007/3-540-39568-75]